In <[EMAIL PROTECTED]>, on 02/24/2008
   at 12:13 PM, "IBM-MAIN@BAMA.UA.EDU" <[EMAIL PROTECTED]> said:

>OTOH, I can readily imagine a utility that attempts an access but on
>failure proceeds with restricted function.  As an example for Shmuel, see
>message GIM69158I, or perhaps IEB1099I.

I was thinking of a case where it checks authorization before it knows
that the access will be required, as part of its initialization. In the
situation you describe I would wasn't RACF to log the violation, assuming
that I didn't misunderstand you.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to